-
Notifications
You must be signed in to change notification settings - Fork 5.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secrets fail to set the uid
, gid
and mode
specified in docker-compose.yml
#9648
Comments
Same thing happens to me. I'm trying to use secrets to workaround having to set the permissions on the host file, by setting the mode in the secret, but it end up with the exact same permissions of the host. This issues comes up for me when using a keyfile for MongoDB replica authentication. The keyfile must not be world-readable, and in *nix this is easy to fix, in Windows (docker-desktop) it's not, so I was hoping that using secrets might fix the problem. It seems not |
As bind mounts do not support different permissions (uid, gid and mode), I suspect that in order to support this, the content of such secrets must be copied into the container (as in #9553), or, use POSIX ACLs (more complex). Am I right @ndeloof? |
well secrets and configs arent writeable (as per specification) so no reason why the implementation cant actually be a copy. |
I'm using a secret for a SSH Private Key that must have a 0400 mode. Setting the uid, gid and mode is a requirement.
|
Same issue applies both to Compose v1 and v2 A possible alternative I can imagine is to replace this approach with a |
In my own opinion, having to rebuild the image to change a secret isn't an option. Major issue? Not now because we haven't reach the production, we're still developing. But once in production, it will be a security concern. The access to the container repository isn't as secure as the access to the production host. Somebody pulling the image will have access to the private keys. Not a good thing at all ! There must be control over the uid, gid and mode for a secret file. |
This is not my proposal: compose would copy the secret into the container (not image) after creation, and before start. This is how secret based on environment is implemented already. |
Oh, my bad ! Sorry 'bout that ! |
So if a secret change, we need to restart the container. Am I right ? |
yes indeed |
Does it implies a redeploy of the container or just the starting phase will be enough ? It would be great if a refresh can be triggered manually (ex: docker compose refresh-secrets) to redo the copy in the container. Having a watchdog to do this automatically may consume resources unnecessary. Secrets don't change often but being able to update them without a restart can be a good solution. |
we could copy secret again at any time, or have a dedicated command for this purpose, but the more obvious one would be to trigger a container |
As long as the secret file can be updated on the fly and still have the good |
I agree with the suggestion on a copy implementation, my use case is local
development since I want to align local dev with a production swarm and a
quick restart on local is totally acceptable to me.
…On Thu, Dec 15, 2022, 16:14 Mario Gravel ***@***.***> wrote:
As long as the secret file can be updated on the fly and still have the
good uid, gid and mode, I'm good !
—
Reply to this email directly, view it on GitHub
<#9648 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABAXP2FJAB2TJB5D2UDM2BDWNMRVRANCNFSM53PZWJBQ>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
I was testing out the secrets functionality using docker compose version 2.14.1 today and was surprised to learn that they don't work the way the docs say they should.
This also seems to affect |
Marking this issue as "kind/enhancement" as secrets never have supported having uid/gid set by compose (v1 or v2), this feature was introduced and only supported by docker swarm |
Can confirm this failing behavior (setting mode, uid & gid) which is not working for me too.
I came across this when I wanted to mount a private ssh key to the checkmk/check-mk-raw container via docker compose secrets and specify uid, gid & mode for the key, when I got the same UNPOTECTED KEY warning when executing ssh manually. |
@peterge1998 the key thing about the docs is the explicit wording
a |
It would be nice if this was supported when using So if anyone gains access they can read the secrets in question without gaining root access. |
Is there any roadmap for this feature (I needed this with configs, not secrets)? |
This error actually was more confusing than helpful to me, and is what led me to finding this discussion. It is seemingly counter to the Compose documentation, which makes it seem like they are supported. Only reading through this entire discucssion did I learn that the Docker team uses the term I'll add my $0.02 that this seems to be a severe limitation to Docker Compose Secrets and implementation should be reconsidered. This leaves the use of secrets at the whim of the image maintainer as to whether they build in a fashion that allows for access or not. For example, in the formal Postgres docker container, they run all entrypoints as a |
enables using [docker compose secrets](https://docs.docker.com/compose/use-secrets/) from arion, which includes: - [top-level `secrets` element](https://docs.docker.com/compose/compose-file/09-secrets/) defining the secrets to be used for the below two use-cases, exposing them at `/run/secrets/<secret_name>`. comes in flavors `file` vs `environment`. - run-time: [`services` top-level `secrets` element](https://docs.docker.com/compose/compose-file/05-services/#secrets) - build time: [build secrets](https://docs.docker.com/build/building/secrets/) (to be [mounted](https://docs.docker.com/build/building/secrets/#secret-mounts) in the `Dockerfile` like `RUN --mount=type=secret,id=<secret_name> ...`) unlike hercules-ci#52, i did not so far add support for their [long syntax](https://docs.docker.com/compose/compose-file/05-services/#long-syntax-4), which despite the confusing documentation appears [limited to Docker Swarm](docker/compose#9648 (comment)), in my understanding limiting its use in Arion.
enables using [docker compose secrets](https://docs.docker.com/compose/use-secrets/) from arion, which includes: - [top-level `secrets` element](https://docs.docker.com/compose/compose-file/09-secrets/) defining the secrets to be used for the below two use-cases, exposing them at `/run/secrets/<secret_name>`. comes in flavors `file` vs `environment`. - run-time: [`services` top-level `secrets` element](https://docs.docker.com/compose/compose-file/05-services/#secrets) - build time: [build secrets](https://docs.docker.com/build/building/secrets/) (to be [mounted](https://docs.docker.com/build/building/secrets/#secret-mounts) in the `Dockerfile` like `RUN --mount=type=secret,id=<secret_name> ...`) unlike hercules-ci#52, i did not so far add support for their [long syntax](https://docs.docker.com/compose/compose-file/05-services/#long-syntax-4), which despite the confusing documentation appears [limited to Docker Swarm](docker/compose#9648 (comment)), in my understanding limiting its use in Arion.
enables using [docker compose secrets](https://docs.docker.com/compose/use-secrets/) from arion, which includes: - [top-level `secrets` element](https://docs.docker.com/compose/compose-file/09-secrets/) defining the secrets to be used for the below two use-cases, exposing them at `/run/secrets/<secret_name>`. comes in flavors `file` vs `environment`. - run-time: [`services` top-level `secrets` element](https://docs.docker.com/compose/compose-file/05-services/#secrets) - build time: [build secrets](https://docs.docker.com/build/building/secrets/) (to be [mounted](https://docs.docker.com/build/building/secrets/#secret-mounts) in the `Dockerfile` like `RUN --mount=type=secret,id=<secret_name> ...`) unlike hercules-ci#52, i did not so far add support for their [long syntax](https://docs.docker.com/compose/compose-file/05-services/#long-syntax-4), which despite the confusing documentation appears [limited to Docker Swarm](docker/compose#9648 (comment)), in my understanding limiting its use in Arion.
enables using [docker compose secrets](https://docs.docker.com/compose/use-secrets/) from arion, which includes: - [top-level `secrets` element](https://docs.docker.com/compose/compose-file/09-secrets/) defining the secrets to be used for the below two use-cases, exposing them at `/run/secrets/<secret_name>`. comes in flavors `file` vs `environment`. - run-time: [`services` top-level `secrets` element](https://docs.docker.com/compose/compose-file/05-services/#secrets) - build time: [build secrets](https://docs.docker.com/build/building/secrets/) (to be [mounted](https://docs.docker.com/build/building/secrets/#secret-mounts) in the `Dockerfile` like `RUN --mount=type=secret,id=<secret_name> ...`) unlike hercules-ci#52, i did not so far add support for their [long syntax](https://docs.docker.com/compose/compose-file/05-services/#long-syntax-4), which despite the confusing documentation appears [limited to Docker Swarm](docker/compose#9648 (comment)), in my understanding limiting its use in Arion.
I’m frustrated with the inadequate documentation and inconsistent support between Docker Swarm and Compose. This is the seventh instance I’ve encountered where Swarm lacks support for a feature that Compose offers, or vice versa. It feels misleading to promote the capability of managing both environments with a single unified configuration in the documentation when, in reality, the latest version of Docker CE does not support the new Compose specification in Swarm. Unfortunately, Swarm lacks dedicated documentation that clearly delineates supported and unsupported features. This time, I’m struggling to mount secrets or configurations in a Compose environment because the application in the container expects specific file permissions, which necessitates a workaround. This issue likely stems from the decision to share a specification across two distinct tools with different levels of support for this spec, both of which are provided by the same vendor. If the intention is for this to be a standalone specification, it should be renamed from “Compose File” to a more tool-agnostic term. The documentation should explicitly state when a feature is not supported by these tools—before developers encounter errors during the transition from development to a small production environment, not after, and certainly not through a GitHub Issue due to an unhelpful error message. I can foresee further confusion with the introduction of Compose Bridge, particularly if it lacks comprehensive documentation. This oversight leads to significant time wasted especially when designing around functionality provided by these tools. |
docker swarm does not rely on the compose specification, but on legacy compose file format. So there's no promise here you get a unified configuration.
"Compose specification" https://compose-spec.io/
please be patient, Compose bridge is still fresh new experimental feature, more docs will come ASAP |
Just as additional awareness for others in this issue, you'll still get this warning for It probably would be beneficial to readers though if the docs at least clarified the common distinction of the types that aren't compatible/supported with The warning at least lets the reader know about the compatibility issue after they've parsed over the docs and attempted it... not the greatest UX but still something. It just shouldn't be adding to confusion though when the feature itself is supported by the configured source type (or in the case of some config/secret sources being compatible in the |
This capability is something you need even if you aren't using swarm. |
I stumbled upon this issue exactly as @ev-adias did almost 2.5 years ago, wondering why my MongoDB key files were not working. I'm sorry, but this is clearly a flaw in the documentation. It's sad that this feature seems not to be on any road map to be brought to docker compose, but so be it. It is however almost rude and a gigantic waste of my time and the time of many other devs out there to not put anything in the documentation that states that this feature is only implemented in Docker Swarm and not supported in Compose. Adjusting the documentation takes minutes and saves many people many hours. I don't understand why this was not done yet. Best regards |
@owl-with-beard uid, gid and mode have been introduced bby docker swarm, and have no obvious equivalent in compose that would allow to add support on a non-swarm docker engine. The question is not about priorization in our roadmap, but feasability.
indeed. The sad point here is that the compose specification (compose-spec.io) is supposed to be vendor neutral, so we can't bring much details on actual support by Docker Compose. I wonder we could relax this rule, as there's actually not much third-party contributions. |
This page is not updated to explain the limitation: It needs to be. This next page was updated finally. I have submitted feedback on docker pages asking that this be made clear because of the ridiculous amount of time I've spent on this issue previously. I patently reject your defeatist attitude regarding support for a fundamental user, group, and mode control of files in compose services on Windows. A 30 second search turns up an option for supporting uid, gid, and mode used WSL Meta data on Windows: Docker runs on WSL by default. If this feature was supported when WSL was available that would be of great benefit to many. If for some reason that was prohibitive, I'm certain another solution could be found such as creating a ramdisk for secrets using tmpfs or other format, copying the secrets there at service startup, and applying the permissions. There are two ways to solve this off the top of my head. Does a solution have to be perfect to at least be better than zero support? A solution with minor limitations is better than no solution at all when it comes to a hard requirement to support file permissions and ownership. Multiple docker services require their config files to configured with permissions in order to boot. The workarounds to avoid making this work in Docker Compose not only waste our time, they make divergent compose settings. Being able to develop with docker compose and deploy with swarm seems to be the promise that Docker is falling short on. |
This would resolve the lack of support apparently. It's unclear if that'll get merged though given the review feedback so far.
I think many that view the Compose reference docs at You can always add an admonition or similar UI element to add some context for clarity. These types of caveats do harm the UX and cause confusion to users trying to leverage them when there's a lack of clarity and they need to troubleshoot and potentially find some resources elsewhere online clarifying the situation. Another example I ran into recently was opt-out for a service from |
should be, indeed.
This is not defeatism, I've tried various approches to this issue in the past, without much success (most recently #12625). I'm not saying we will never offer this feature, just we don't have the adequate features exposed by the engine API to succeed yet.
Which demonstrates you're under-estimating the actual challenge we have to address here. The question is not to get this running from WSL within Docker Desktop, but to get this supported in the Docker engine API, which hardly will accept such a non-portable option that can't be supported on Linux.
Considering Docker engine without swarm enabled has no support for configs and secrets, the existing behavior already is a solution with known limitations. The other option is for you to include configs/secrets in your image as a build step, maybe relying on @polarathene #12448 coms with some limitations and breaking changes (which I tried to address in #12625). Those are significant enough so that we don't want to silently switch from bind mount to such a solution without an explicit opt-in by compose file author, otherwise we will have to deal with regression reports (many users rely on the bind mount behavior to get config/secret dynamically updated in container) |
Just a quick note: With lack of native support for secrets/configs in docker engine (non-swarm) a possible workaround is to build a specific image for compose to COPY required files inside container: services:
app:
secrets:
- source: app_config
target: /etc/
uid: <UID> # not supported
gid: <GID>
secrets:
app_config:
file: ./app.cfg can be replaced by: services:
app:
build:
dockerfile_inline: |
FROM myapp
COPY --chown <UID>:<GID> ./app.cfg:/etc/ This is far from being perfect, but at least wanted to get this documented in this issue for those blocked by this limitation |
@ndeloof no worries! I appreciate all the time and effort put into figuring out a solution 😎 Slightly-offtopic, but is there any blockers for ID mapped support?
I did try to get it working with compose and volume mount options a while back but ran into some issue that presumably is a limitation with Docker Engine, it worked fine to create the equivalent mount on the host without docker involved though. |
Hi all,
@polarathene: Yes it does resolve it for I don't have a very strong opinion on that but I don't think directories should be supported because I think it doesn't match the original concept behind configs and secrets and it also have some implementation issues like using
@ndeloof: Would it be enough to add a big warning of the behaviour change (and the way to update compose files) in the release notes as you initially mentioned here #11867 (comment) ? |
That happened for me when I initially came across it and thought from the docs (at least back then, haven't checked the current docs for it) that it was meant to be more secure, along with the It's only because I noticed in the container none of those settings actually applied outside of swarm that I realized it was effectively a misleading bind mount with different syntax added as a fallback convenience for swarm users (actual justification for it IIRC). As for avoiding regression reports from existing users... I suppose until you're ready to make it a breaking change, one option is to go opt-in as suggested with something like Then clearly document that the Technically since |
A common pattern is to declare a whole
This was introduced to offer some parity with docker swarm, then users started relying on it in development to get immediate update on config changes (which could be implemented with |
@ndeloof thanks for your answers. To manage the legacy, I think it could be possible to create an environment variable like Regarding the PR #12625, if I understood properly, bind mounts will still be used for services:
A:
image: alpine
configs:
- source: etc_hosts
target: /etc/hosts
command: cat /etc/hosts
B:
image: alpine
configs:
- source: etc_hosts
target: /etc/hosts
mode: "0777"
command: cat /etc/hosts
configs:
etc_hosts:
file: /etc/hosts |
@schaubl fully agree. #12625 is just an experiment to prevent breaking changes, still unpleasant - also comes with multiple drawbacks I can't detail here. As you noticed,
Please note this is exactly what some expect ! The best option I have in mind is for docker engine to enable secrets/config support in standalone (non-swarm) mode. I can't tell about how complex this could be, but for sure the code is already there :P cc @colinhemmings |
Description
Docker secrets specified using the long syntax for the
docker-compose.yml
file fail to set the specifieduid
,gid
andmode
.Also, from the docs, the default value of the
uid
andgid
fields should be the user that runs the container however the value remains whatever was set on the host machine.Steps to reproduce the issue:
Dockerfile
docker-compose.yml
somefile.txt
)docker compose run secrets-tester
Describe the results you received:
Received Output:
Describe the results you expected:
Expected Output:
Additional information you deem important (e.g. issue happens only occasionally):
Same behavior is observed in these cases:
tester
usersource
andtarget
names for the file indocker-compose.yml
uid
andgid
forroot
uid
andgid
mode
Output of
docker compose version
:Output of
docker info
:Additional environment details:
The text was updated successfully, but these errors were encountered: